Author of the publication

Proxy signcryption scheme in the standard model.

, and . Security and Communication Networks, 8 (8): 1431-1446 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RIHT: A Novel Hybrid IP Traceback Scheme., and . IEEE Trans. Information Forensics and Security, 7 (2): 789-797 (2012)An Anonymous Car Rental System Based on NFC., , and . ISBAST, IEEE, (2013)Tracking and identifying a magnetic spheroid target using unscented particle filter., , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800931. SPIE, (2011)Magnetic Field Extrapolation Based on Improved Back Propagation Neural Network., , , , and . AICI (1), volume 6319 of Lecture Notes in Computer Science, page 64-70. Springer, (2010)Proxy signcryption scheme in the standard model., and . Security and Communication Networks, 8 (8): 1431-1446 (2015)Research and implementation of M2M smart home and security system., , and . Security and Communication Networks, 8 (16): 2704-2711 (2015)ECISER: Efficient Clip-art Image SEgmentation by Re-rasterization., and . Computer-Aided Design, (2015)Avoiding Pitfalls when Using NVIDIA GPUs for Real-Time Tasks in Autonomous Systems., , , , , and . ECRTS, volume 106 of LIPIcs, page 20:1-20:21. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)A Novel Human-Computer Interface Based on Passive Acoustic Localisation., , , , and . HCI (2), volume 4551 of Lecture Notes in Computer Science, page 901-909. Springer, (2007)Correction to: An end-to-end differential network learning method for semantic segmentation., , , and . Int. J. Machine Learning & Cybernetics, 10 (7): 1925 (2019)